Artigos de revistas sobre o tema "Personally-Identifiable information protection"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Personally-Identifiable information protection".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Liu, Deliang. "The Protection of Personally Identifiable Information". SCRIPT-ed 4, n.º 4 (15 de dezembro de 2007): 389–406. http://dx.doi.org/10.2966/scrip.040407.389.
Texto completo da fonteFugkeaw, Somchart, e Pattavee Sanchol. "Enabling Efficient Personally Identifiable Information Detection with Automatic Consent Discovery". ECTI Transactions on Computer and Information Technology (ECTI-CIT) 17, n.º 2 (8 de junho de 2023): 245–54. http://dx.doi.org/10.37936/ecti-cit.2023172.252270.
Texto completo da fonteOnik, Md Mehedi Hassan, Chul-Soo Kim, Nam-Yong Lee e Jinhong Yang. "Privacy-aware blockchain for personal data sharing and tracking". Open Computer Science 9, n.º 1 (15 de abril de 2019): 80–91. http://dx.doi.org/10.1515/comp-2019-0005.
Texto completo da fontePosey, Clay, Uzma Raja, Robert E. Crossler e A. J. Burns. "Taking stock of organisations’ protection of privacy: categorising and assessing threats to personally identifiable information in the USA". European Journal of Information Systems 26, n.º 6 (novembro de 2017): 585–604. http://dx.doi.org/10.1057/s41303-017-0065-y.
Texto completo da fonteBomba, David, e George Hallit. "Will the new Australian Health Privacy Law provide adequate protection?" Australian Health Review 25, n.º 3 (2002): 141. http://dx.doi.org/10.1071/ah020141a.
Texto completo da fonteMavridis, Ioannis. "Deploying Privacy Improved RBAC in Web Information Systems". International Journal of Information Technologies and Systems Approach 4, n.º 2 (julho de 2011): 70–87. http://dx.doi.org/10.4018/jitsa.2011070105.
Texto completo da fonteEllis, Donna A. "A case history in architectural acoustics: Security, acoustics, the protection of personally identifiable information (PII), and accessibility for the disabled". Journal of the Acoustical Society of America 136, n.º 4 (outubro de 2014): 2182. http://dx.doi.org/10.1121/1.4899907.
Texto completo da fonteCruz, Bruno Silveira, e Murillo de Oliveira Dias. "Does digital privacy really exist? When the consumer is the product". Asian Journal of Economics and Business Management 1, n.º 1 (28 de junho de 2022): 39–43. http://dx.doi.org/10.53402/ajebm.v1i1.53.
Texto completo da fonteOlabanji, Samuel Oladiipo, Oluseun Babatunde Oladoyinbo, Christopher Uzoma Asonze, Tunbosun Oyewale Oladoyinbo, Samson Abidemi Ajayi e Oluwaseun Oladeji Olaniyi. "Effect of Adopting AI to Explore Big Data on Personally Identifiable Information (PII) for Financial and Economic Data Transformation". Asian Journal of Economics, Business and Accounting 24, n.º 4 (26 de fevereiro de 2024): 106–25. http://dx.doi.org/10.9734/ajeba/2024/v24i41268.
Texto completo da fonteGeorgiadou, Yola, Rolf de By e Ourania Kounadi. "Location Privacy in the Wake of the GDPR". ISPRS International Journal of Geo-Information 8, n.º 3 (22 de março de 2019): 157. http://dx.doi.org/10.3390/ijgi8030157.
Texto completo da fonteUkwueze, Festus. "Strengthening the Legal Framework for Personal Data Protection in Nigeria". Nigerian Juridical Review 16 (28 de junho de 2022): 124–42. http://dx.doi.org/10.56284/tnjr.v16i1.16.
Texto completo da fonteVillarán, Carlos, e Marta Beltrán. "User-Centric Privacy for Identity Federations Based on a Recommendation System". Electronics 11, n.º 8 (14 de abril de 2022): 1238. http://dx.doi.org/10.3390/electronics11081238.
Texto completo da fonteMićović, Marko, Uroš Radenković e Pavle Vuletić. "Network Layer Privacy Protection Using Format-Preserving Encryption". Electronics 12, n.º 23 (27 de novembro de 2023): 4800. http://dx.doi.org/10.3390/electronics12234800.
Texto completo da fonteKoo, Jahoon, Giluk Kang e Young-Gab Kim. "Security and Privacy in Big Data Life Cycle: A Survey and Open Challenges". Sustainability 12, n.º 24 (17 de dezembro de 2020): 10571. http://dx.doi.org/10.3390/su122410571.
Texto completo da fonteFiaz, Faisal, Syed Muhammad Sajjad, Zafar Iqbal, Muhammad Yousaf e Zia Muhammad. "MetaSSI: A Framework for Personal Data Protection, Enhanced Cybersecurity and Privacy in Metaverse Virtual Reality Platforms". Future Internet 16, n.º 5 (18 de maio de 2024): 176. http://dx.doi.org/10.3390/fi16050176.
Texto completo da fonteOluwatoyin Ajoke Fayayola, Oluwabukunmi Latifat Olorunfemi e Philip Olaseni Shoetan. "DATA PRIVACY AND SECURITY IN IT: A REVIEW OF TECHNIQUES AND CHALLENGES". Computer Science & IT Research Journal 5, n.º 3 (18 de março de 2024): 606–15. http://dx.doi.org/10.51594/csitrj.v5i3.909.
Texto completo da fonteKelly, Miriam, Eoghan Furey e Kevin Curran. "How to Achieve Compliance with GDPR Article 17 in a Hybrid Cloud Environment". Sci 2, n.º 2 (2 de abril de 2020): 22. http://dx.doi.org/10.3390/sci2020022.
Texto completo da fonteKelly, Miriam, Eoghan Furey e Kevin Curran. "How to Achieve Compliance with GDPR Article 17 in a Hybrid Cloud Environment". Sci 3, n.º 1 (4 de janeiro de 2021): 3. http://dx.doi.org/10.3390/sci3010003.
Texto completo da fonteReyes, Irwin, Primal Wijesekera, Joel Reardon, Amit Elazari Bar On, Abbas Razaghpanah, Narseo Vallina-Rodriguez e Serge Egelman. "“Won’t Somebody Think of the Children?” Examining COPPA Compliance at Scale". Proceedings on Privacy Enhancing Technologies 2018, n.º 3 (1 de junho de 2018): 63–83. http://dx.doi.org/10.1515/popets-2018-0021.
Texto completo da fonteSun, Yuanyi, Sencun Zhu e Yu Chen. "ZoomP3: Privacy-Preserving Publishing of Online Video Conference Recordings". Proceedings on Privacy Enhancing Technologies 2022, n.º 3 (julho de 2022): 630–49. http://dx.doi.org/10.56553/popets-2022-0089.
Texto completo da fonteShakor, Ali M. "When Wireless Technologies Faces COVID-19: via Apps using to Combat the Pandemic and Save the Economy". Tikrit Journal of Engineering Sciences 29, n.º 2 (27 de julho de 2022): 41–50. http://dx.doi.org/10.25130/tjes.29.2.6.
Texto completo da fonteYamcharoen, P., O. S. Folorunsho, A. Bayewu e T. P. Ojo. "Impact of Digitalizing Healthcare Business Operations on Cybersecurity Landscape". Advances in Multidisciplinary and scientific Research Journal Publication 8, n.º 4 (30 de dezembro de 2022): 27–34. http://dx.doi.org/10.22624/aims/bhi/v8n4p3.
Texto completo da fonteKollnig, Konrad, Anastasia Shuba, Reuben Binns, Max Van Kleek e Nigel Shadbolt. "Are iPhones Really Better for Privacy? A Comparative Study of iOS and Android Apps". Proceedings on Privacy Enhancing Technologies 2022, n.º 2 (3 de março de 2022): 6–24. http://dx.doi.org/10.2478/popets-2022-0033.
Texto completo da fonteKuang, Lida, Samruda Pobbathi, Yuri Mansury, Matthew A. Shapiro e Vijay K. Gurbani. "Predicting age and gender from network telemetry: Implications for privacy and impact on policy". PLOS ONE 17, n.º 7 (21 de julho de 2022): e0271714. http://dx.doi.org/10.1371/journal.pone.0271714.
Texto completo da fonteGonzalez-Granadillo, Gustavo, Sofia Anna Menesidou, Dimitrios Papamartzivanos, Ramon Romeu, Diana Navarro-Llobet, Caxton Okoh, Sokratis Nifakos, Christos Xenakis e Emmanouil Panaousis. "Automated Cyber and Privacy Risk Management Toolkit". Sensors 21, n.º 16 (15 de agosto de 2021): 5493. http://dx.doi.org/10.3390/s21165493.
Texto completo da fonteMakhija, Anil K. "Deep Learning Application – Identifying PII (Personally Identifiable Information) to Protect". Journal of Accounting, Finance, Economics, and Social Sciences 5, n.º 2 (2020): 10–16. http://dx.doi.org/10.62458/jafess.160224.5(2)10-16.
Texto completo da fonteBader, Michael D. M., Stephen J. Mooney e Andrew G. Rundle. "Protecting Personally Identifiable Information When Using Online Geographic Tools for Public Health Research". American Journal of Public Health 106, n.º 2 (fevereiro de 2016): 206–8. http://dx.doi.org/10.2105/ajph.2015.302951.
Texto completo da fonteHofman, Darra, Victoria Louise Lemieux, Alysha Joo e Danielle Alves Batista. "“The margin between the edge of the world and infinite possibility”". Records Management Journal 29, n.º 1/2 (11 de março de 2019): 240–57. http://dx.doi.org/10.1108/rmj-12-2018-0045.
Texto completo da fonteShin, Yong-Nyuo. "Standard Implementation for Privacy Framework and Privacy Reference Architecture for Protecting Personally Identifiable Information". International Journal of Fuzzy Logic and Intelligent Systems 11, n.º 3 (30 de setembro de 2011): 197–203. http://dx.doi.org/10.5391/ijfis.2011.11.3.197.
Texto completo da fonteHouser, Ryan. "Private Health Information Legal Protections in Emergency Medical Services". International Journal of Paramedicine, n.º 1 (16 de novembro de 2022): 29–37. http://dx.doi.org/10.56068/jtng9057.
Texto completo da fonteSodiya, Adesina S., e Adegbuyi B. "A Framework for Protecting Users' Privacy in Cloud". International Journal of Information Security and Privacy 10, n.º 4 (outubro de 2016): 33–43. http://dx.doi.org/10.4018/ijisp.2016100102.
Texto completo da fonteBergren, Martha Dewey. "HIPAA-FERPA REVISITED". Journal of School Nursing 20, n.º 2 (abril de 2004): 107–12. http://dx.doi.org/10.1177/10598405040200020901.
Texto completo da fonteBaker, Christina, Cynthia A. Galemore e Kerri McGowan Lowrey. "Information Sharing in the School Setting During a Public Health Emergency". NASN School Nurse 35, n.º 4 (15 de maio de 2020): 198–202. http://dx.doi.org/10.1177/1942602x20925031.
Texto completo da fonteBergren, Martha Dewey, e Kathleen Johnson. "Data Sharing". NASN School Nurse 34, n.º 4 (julho de 2019): 211–13. http://dx.doi.org/10.1177/1942602x19852934.
Texto completo da fonteRashid, Husain, Khan Rabia, Tyagi Rajesh e Kumar Komakula Manoj. "Enhancing cyber security in health care industry by using ISO 27001 accreditation". i-manager's Journal on Digital Forensics & Cyber Security 1, n.º 2 (2023): 26. http://dx.doi.org/10.26634/jdf.1.2.20020.
Texto completo da fonteNallamolu, Sathish, e Srinivas Padmanabhuni. "A Privacy Preserving Generative Adversarial Network for Image Data". ITM Web of Conferences 53 (2023): 03004. http://dx.doi.org/10.1051/itmconf/20235303004.
Texto completo da fonteJayasuriya, D. Dulani, e Alexandra Sims. "From the abacus to enterprise resource planning: is blockchain the next big accounting tool?" Accounting, Auditing & Accountability Journal 36, n.º 1 (6 de maio de 2022): 24–62. http://dx.doi.org/10.1108/aaaj-08-2020-4718.
Texto completo da fonteMohammadzadeh , Nasibeh, Sadegh Dorri Nogoorani e José Luis Muñoz-Tapia . "Decentralized Factoring for Self-Sovereign Identities". Electronics 10, n.º 12 (18 de junho de 2021): 1467. http://dx.doi.org/10.3390/electronics10121467.
Texto completo da fonteElder, Jonathan, Nicole Jacobson, Natalie Remsen e Kim Wilmath. "Behind Enemy Lines". Journal of Information Technology Education: Discussion Cases 6 (2017): 12. http://dx.doi.org/10.28945/3928.
Texto completo da fonteГерасимов, А. А., А. В. Мозговой, К. А. Пугачев e В. А. Кузнецов. "Choosing of data protection facilities in the information systems of personally identifiable information". Engineering Journal: Science and Innovation, n.º 24 (novembro de 2013). http://dx.doi.org/10.18698/2308-6033-2013-11-1016.
Texto completo da fonteKumekawa, Joanne. "Health Information Privacy Protection: Crisis or Common Sense?" OJIN: The Online Journal of Issues in Nursing 6, n.º 3 (30 de setembro de 2001). http://dx.doi.org/10.3912/ojin.vol6no03man02.
Texto completo da fontePfaff, Emily R., Melissa A. Haendel, Kristin Kostka, Adam Lee, Emily Niehaus, Matvey B. Palchuk, Kellie Walters e Christopher G. Chute. "Ensuring a safe(r) harbor: Excising personally identifiable information from structured electronic health record data". Journal of Clinical and Translational Science 6, n.º 1 (9 de dezembro de 2021). http://dx.doi.org/10.1017/cts.2021.880.
Texto completo da fonteChoi, Min-Wook. "The Use and Protection of Personally Non- Identifiable Information in Digital Behavioral Advertising in the Age of Big Data". Indian Journal of Science and Technology 9, n.º 44 (30 de novembro de 2016). http://dx.doi.org/10.17485/ijst/2016/v9i44/105097.
Texto completo da fonteKarabasttk, Onur mname. "The Role of Data Protection and Privacy Law in Personally Identifiable Information Driven Mergers from the EU Merger Perspective". SSRN Electronic Journal, 2017. http://dx.doi.org/10.2139/ssrn.3097125.
Texto completo da fonteM P, Haripriya. "Cyber Security Unveiled: Trends and Protections in the Digital World". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 07, n.º 07 (15 de julho de 2023). http://dx.doi.org/10.55041/ijsrem24720.
Texto completo da fonteANIL KUMAR et al. "AN ANALYSIS OF THE LAWS CONCERNING DIGITAL PRIVACY". Russian Law Journal 11, n.º 4s (5 de abril de 2023). http://dx.doi.org/10.52783/rlj.v11i4s.834.
Texto completo da fonte"Network Safety On Blockchain-Based Applications Across Multiple Domains". International Journal For Innovative Engineering and Management Research, 27 de dezembro de 2020, 619–23. http://dx.doi.org/10.48047/ijiemr/v09/i12/104.
Texto completo da fonteM, Rekha, e Shoba Rani P. "Determining Intrusion Attacks Against Online Applications Using Cloud-Based Data Security". ICST Transactions on Scalable Information Systems, 5 de fevereiro de 2024. http://dx.doi.org/10.4108/eetsis.5028.
Texto completo da fonteHerath, Suvineetha, Haywood Gelman e Lisa McKee. "Privacy Harm and Non-Compliance from a Legal Perspective". Journal of Cybersecurity Education Research and Practice 2023, n.º 2 (12 de outubro de 2023). http://dx.doi.org/10.32727/8.2023.18.
Texto completo da fonteDe Araujo Almeida, Bethania, Denise Moraes Pimenta e Mauricio Barreto. "Perceptions and experiences on data sharing and linkage for research and the evaluation of public health policy." International Journal of Population Data Science 7, n.º 3 (25 de agosto de 2022). http://dx.doi.org/10.23889/ijpds.v7i3.2013.
Texto completo da fonte